Bug 2221662 (CVE-2022-24834) - CVE-2022-24834 redis: heap overflow in the lua cjson and cmsgpack libraries
Summary: CVE-2022-24834 redis: heap overflow in the lua cjson and cmsgpack libraries
Keywords:
Status: NEW
Alias: CVE-2022-24834
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2222024 2221671 2221672 2221674 2221675 2221676 2221677 2221678 2221679 2221681 2221682 2221692 2221693 2222025
Blocks: 2221650
TreeView+ depends on / blocked
 
Reported: 2023-07-10 14:50 UTC by Zack Miele
Modified: 2024-01-03 11:55 UTC (History)
78 users (show)

Fixed In Version: redis 7.0.12, redis 6.2.13, redis 6.0.20
Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow flaw was found in Redis. This flaw allows a local authenticated attacker user or attacker to execute a specially crafted Lua script in Redis. This attack triggers a heap overflow in the cjson and cmsgpack libraries, resulting in heap corruption and potential remote code execution.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Zack Miele 2023-07-10 14:50:00 UTC
CVE-2022-24834 - A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users.

https://github.com/redis/redis/security/advisories/GHSA-p8x2-9v9q-c838

Comment 3 TEJ RATHI 2023-07-11 15:00:13 UTC
Created redis tracking bugs for this issue:

Affects: epel-all [bug 2222024]
Affects: fedora-all [bug 2222025]


Note You need to log in before you can comment on or make changes to this bug.